-
公开(公告)号:BRPI0619974A2
公开(公告)日:2011-10-25
申请号:BRPI0619974
申请日:2006-10-16
Applicant: IBM
Inventor: CLEMENT JEAN-YVES , MARMIGERE GERARD , SECONDO PIERRE , BAUCHOT FREDERIC
Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
-
公开(公告)号:AT386983T
公开(公告)日:2008-03-15
申请号:AT03763701
申请日:2003-06-13
Applicant: IBM
Inventor: MARMIGERE GERARD , PICON JOAQUIN , SECONDO PIERRE
Abstract: A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.
-
公开(公告)号:AU2003250883A8
公开(公告)日:2004-02-02
申请号:AU2003250883
申请日:2003-06-13
Applicant: IBM
Inventor: PICON JOAQUIN , SECONDO PIERRE , MARMIGERE GERARD
Abstract: A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.
-
公开(公告)号:AU2003250883A1
公开(公告)日:2004-02-02
申请号:AU2003250883
申请日:2003-06-13
Applicant: IBM
Inventor: MARMIGERE GERARD , PICON JOAQUIN , SECONDO PIERRE
Abstract: A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.
-
15.
公开(公告)号:CA2633882C
公开(公告)日:2014-01-28
申请号:CA2633882
申请日:2006-10-16
Applicant: IBM
Inventor: BAUCHOT FREDERIC , CLEMENT JEAN-YVES , MARMIGERE GERARD , SECONDO PIERRE
Abstract: A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.
-
公开(公告)号:DE602006007486D1
公开(公告)日:2009-08-06
申请号:DE602006007486
申请日:2006-10-16
Applicant: IBM
Inventor: BAUCHOT FREDERIC , CLEMENT JEAN-YVES , MARMIGERE GERARD , SECONDO PIERRE
Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
-
公开(公告)号:AT419603T
公开(公告)日:2009-01-15
申请号:AT06110026
申请日:2006-02-16
Applicant: IBM
Inventor: COMMAGNAC FRANCOIS , MESTRES JEAN CHRISTOPHE , PICON JOAQUIN , SECONDO PIERRE
Abstract: The present invention relates to a system for tamper detection. A tamper detection system in accordance with an embodiment of the present invention includes: a passive electronic sensor including a circuit having first, second, and third nodes; a load connected between the first and second nodes of the circuit; a friable electrical connection element connected between the second and third nodes of the circuit; and a storage unit, connected to the second node of the circuit, for storing an identification code of the sensor; wherein in use a voltage is applied across the first and third nodes of the circuit, and when the friable electrical connection element is intact, the second node of the circuit is at a first voltage, and when the friable electrical connection element is broken, the second node of the circuit is at a second voltage.
-
18.
公开(公告)号:CA2633882A1
公开(公告)日:2007-06-21
申请号:CA2633882
申请日:2006-10-16
Applicant: IBM
Inventor: BAUCHOT FREDERIC , CLEMENT JEAN-YVES , SECONDO PIERRE , MARMIGERE GERARD
Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
-
公开(公告)号:GB2412998A
公开(公告)日:2005-10-12
申请号:GB0505002
申请日:2005-03-11
Applicant: IBM
Inventor: COLLETT JEAN LUC , MARMIGERE GERARD , PICON JOAQUIN , SECONDO PIERRE
Abstract: Electronic system for managing the payment by the users of car parks comprising at least one kiosk (16, 18 or 20) used by a user to perform a payment corresponding to the period of time the user's car is authorized to be parked in a car park (10, 12 or 14) and a payment device located located inside the user's car having a screen visible from outside for displaying the time limit until which the car is authorized to be parked. The kiosk and the payment devices of the cars parked in the car park are connected by a wireless link so that the kiosk detects a car when it is parked within the car park and registers the car identification, the kiosk transmitting to the payment device the time limit to be displayed on its screen after the user has performed the payment corresponding to the amount of time for which the car will be authorized to be parked.
-
公开(公告)号:DE3784168D1
公开(公告)日:1993-03-25
申请号:DE3784168
申请日:1987-09-23
Applicant: IBM
Inventor: BUSTINI LIONEL , CRETEGNY ANDRE , MARMIGERE GERARD , PLATEL GUY , SECONDO PIERRE
Abstract: The data transfer process involves using nodes where incoming packets are enqueued prior to being forwarded toward their destination. Clipping operations are performed within the nodes by selectively discarding enqueued packets. The packets include an EC field initially loaded to indicate whether the corresponding packet is eligible for clipping or not within the network. The packets from a source terminal are made eligible for clipping on a periodic basis. The sequence is made to designate as eligible for clipping every other packet from the source. Each packet includes a bit position (PC) to be used to bar the clipping of the corresponding packet. If required within a network node, a non eligible for clipping packet may be clipped, with the prevent clipping bit of next from same source being set during its transfer through the node, whereby the next packet is prevented from any subsequent clipping along its path within the network.
-
-
-
-
-
-
-
-
-